• Aucun résultat trouvé

Role-Based Access Control

Finding Differences in Privilege Protection and their Origin in Role-Based Access Control Implementations

Finding Differences in Privilege Protection and their Origin in Role-Based Access Control Implementations

... unauthorized access refer to existing privilege checks in the application that do not validate for the right ...used access control approach is role-based access control ...

206

Protecting sensitive data using differential privacy and role-based access control

Protecting sensitive data using differential privacy and role-based access control

... 3.4.2 Hadoop Distributed File System (HDFS) The Hadoop Distributed File System is designed to store massive amounts of data (terabytes or even petabytes), running on large clusters having thousands of nodes while ...

102

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... on access control ...the access conditions and the use of Semantic Web languages ...press access control policies for RDF documents, while we provide an authorization mechanism for RDF ...

7

The case for Access Control on XML relationships

The case for Access Control on XML relationships

... Role-based access control (RBAC) models for XML [18,35] suffer from the same limitation wrt access control on XML ...certain role, semantically linked with other ...

24

Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics

Evaluating the comprehensive complexity of authorization-based access control policies using quantitative metrics

... SELinux access control models, and with the purpose of putting in practice the metrics defined in Section ...SELinux access control mechanism is primar- ily based on the TE (type ...

13

Authentication and access control based on distributed ledger technology

Authentication and access control based on distributed ledger technology

... an access request in order to access ...and role permissions by creating, changing and disabling the specific ...permissions. Role contract is usable for creating roles, changing the ...

9

Model-Based Tests for Access Control Policies

Model-Based Tests for Access Control Policies

... random tests. This is with a comparably high num- ber of tests: 71-78%. 4. With the exception of strategy 2.111, strategies that either negate or do not negate both roles and permissions perform as good as random tests ...

11

Reputation trust mechanism under the organizational-based access control model

Reputation trust mechanism under the organizational-based access control model

... The role of a subject is simply called a ...the role of an action is called an activity whereas the role of an object is called a ...a role having permission, prohibition or obligation to ...

17

An Access Control Model for Web Databases

An Access Control Model for Web Databases

... enforces access control based on business application logic rather than primitive reads and ...database access control can grant or revoke access to resources only according to ...

9

A new scalable authentication and access control mechanism for 5G-based IoT

A new scalable authentication and access control mechanism for 5G-based IoT

... (core Access and Mobility Management ...vital role in the AAC mechanism, but also it acts as an interface between the devices and the other network functions because of its responsibility in the network ...

34

Ontology-Based Access Rights Management

Ontology-Based Access Rights Management

... of access control based on annotations of resources are particularly well suited for social ...network. Access control poli- cies are then based on these ...has access to ...

14

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

... 5.3 Role-centric ABAC Application JACPoL can also be used to implement a language for permission filtering poli- cies (PFP) in a role-centric ABAC model ...get role permission sets which, as defined ...

17

XPACML eXtensible Privacy Access Control Markup Language

XPACML eXtensible Privacy Access Control Markup Language

... To meet this need, several specifications have been defined and adopted to technically protect personal data. The policy-based e-Privacy management is a hot research topic, especially privacy policy negotiation ...

6

Verifying Resource Access Control on Mobile Interactive Devices

Verifying Resource Access Control on Mobile Interactive Devices

... to access control policies specified ...resource access control framework than Igarashi and Kobayashi, and without explicit notions of resources, but are able to ensure through a static ...

26

Access Control for HTTP Operations on Linked Data

Access Control for HTTP Operations on Linked Data

... anonymity- based solution [8] and delegates attribute anonymisation to the client side, thus sensitive information is not disclosed to the ...in access policies. As long as literals included in ...

16

Database access control within a Java application

Database access control within a Java application

... Fine-grained access control allows to implement security policies with packages of functions and then associate those security policies with tables or ...fine-grained access control is made ...

8

A Social Semantic Web Access Control Model

A Social Semantic Web Access Control Model

... The Access Condition grants or restricts the access to the ...the access is granted to the ...the access is denied, we introduce the property hasCat- ...the access condition, and they ...

13

On the isofunctionality of network access control lists

On the isofunctionality of network access control lists

... I. I NTRODUCTION The use of information and communication technologies is growing rapidly. Corporate networks, always in constant metamorphose, shall face the expansion of network security threats, and constantly update ...

7

Access control in IoT environments: Feasible scenarios

Access control in IoT environments: Feasible scenarios

... to access an entity or object in a computer ...to access certain information from another entity, requires to send a token together the ...complex access control policies are not ...

7

Automatic Error Finding in Access-Control Policies

Automatic Error Finding in Access-Control Policies

... ABSTRACT Access-control policies are a key infrastructural technology for computer ...not access control policies implement the security intent of system ...

14

Show all 10000 documents...

Sujets connexes